Sciweavers

3555 search results - page 38 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 7 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
IROS
2007
IEEE
198views Robotics» more  IROS 2007»
15 years 7 months ago
Cooperation of heterogeneous, autonomous robots: A case study of humanoid and wheeled robots
Abstract— In this paper we present a case study of cooperation of a strongly heterogeneous robot team, composed of a highly articulated humanoid robot and a wheeled robot with la...
Jutta Kiener, Oskar von Stryk
PAKM
2000
15 years 2 months ago
Knowledge Management and New Product Development: Learning from a Software Development Firm
The core of the new product development [NPD] process centers on knowledge creation, utilization and the management of knowledge. This manuscript uses a software firm case to esta...
Abraham B. Shani, James A. Sena
EUROMICRO
2011
IEEE
14 years 1 months ago
Developing Safe and Dependable Sensornets
Sensornets are being widely proposed as a solution technology in a wide number of applications, e.g. health care. As part of this work some key challenges for the safety and senso...
Iain Bate, Yafeng Wu, John A. Stankovic
ISCA
2007
IEEE
198views Hardware» more  ISCA 2007»
15 years 7 months ago
Making the fast case common and the uncommon case simple in unbounded transactional memory
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs, allowing programmers to exploit more effectively the s...
Colin Blundell, Joe Devietti, E. Christopher Lewis...